Sciweavers

78 search results - page 8 / 16
» Variable granularity for improving precision of impact analy...
Sort
View
AAAI
2004
13 years 9 months ago
Evaluating Ontology Cleaning
Ontology as a discipline of Computer Science has made many claims about its usefulness, however to date there has been very little evaluation of those claims. We present the resul...
Christopher A. Welty, Ruchi Mahindru, Jennifer Chu...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Light-weight context recovery for efficient and accurate program analyses
To compute accurate information efficiently for programs that use pointer variables, a program analysis must account for the fact that a procedure may access different sets of mem...
Donglin Liang, Mary Jean Harrold
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
14 years 1 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...
BMCBI
2007
172views more  BMCBI 2007»
13 years 7 months ago
Bayesian approaches to reverse engineer cellular systems: a simulation study on nonlinear Gaussian networks
Background: Reverse engineering cellular networks is currently one of the most challenging problems in systems biology. Dynamic Bayesian networks (DBNs) seem to be particularly su...
Fulvia Ferrazzi, Paola Sebastiani, Marco Ramoni, R...
TCOM
2010
130views more  TCOM 2010»
13 years 6 months ago
On modeling, analysis, and optimization of packet aggregation systems
Abstract—In packet communication systems, a header is attached to the transmitted packet at each layer. The overhead due to the transmission of the individual header can have a s...
Jung Ha Hong, Khosrow Sohraby